First published: Wed Nov 09 2022(Updated: )
A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-bb-rCgtmY2 This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ftd-tls-bb-rCgtmY2 is considered critical due to the potential for unauthorized access to sensitive information.
To fix cisco-sa-ftd-tls-bb-rCgtmY2, apply the recommended updates provided by Cisco for Firepower Threat Defense Software.
The vulnerability cisco-sa-ftd-tls-bb-rCgtmY2 is caused by improper implementation of countermeasures against a Bleichenbacher attack.
Organizations using Cisco Firepower Threat Defense Software are affected by cisco-sa-ftd-tls-bb-rCgtmY2.
Yes, cisco-sa-ftd-tls-bb-rCgtmY2 can be exploited by an unauthenticated, remote attacker.